General

  • Target

    2056-83-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    ff4cfd89a3859aa60af2f6637b425dd2

  • SHA1

    a897c997cbc5cfd493616e791a319bdfa7953401

  • SHA256

    6a011208bc39704cb789ceb50ca5666fdc1162a7c98e76e5815658ea05c6ee93

  • SHA512

    7c93b478179a1b0fe129841e5303feb329bd73fc7f6dcac5189c8d93b71a3c1bf540a86ea1b5f20de00b907d0698e397d72d38cffce195e87493b55d1238cebe

  • SSDEEP

    3072:MN9zgaHeuGhriktrBxN3kuZ+zdzq8e8hj:K9Ie4rhTodzq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-83-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows x86


    Headers

    Sections